/openbmc/linux/tools/crypto/ccp/ |
H A D | dbc.c | 21 int get_nonce(int fd, void *nonce_out, void *signature) in get_nonce() argument 24 .auth_needed = !!signature, in get_nonce() 29 if (signature) in get_nonce() 30 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in get_nonce() 39 int set_uid(int fd, __u8 *uid, __u8 *signature) in set_uid() argument 44 assert(signature); in set_uid() 47 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in set_uid() 54 int process_param(int fd, int msg_index, __u8 *signature, int *data) in process_param() argument 62 assert(signature); in process_param() 65 memcpy(tmp.signature, signature, sizeof(tmp.signature)); in process_param() [all …]
|
H A D | test_dbc.py | 36 self.signature = b"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF" 142 get_nonce(self.d, self.signature) 148 set_uid(self.d, self.uid, self.signature) 154 process_param(self.d, PARAM_GET_SOC_PWR_CUR, self.signature) 160 process_param(self.d, PARAM_SET_PWR_CAP, self.signature, 1000) 173 set_uid(self.d, self.uid, self.signature) 177 get_nonce(self.d, self.signature) 193 soc_power_max = process_param(self.d, PARAM_GET_SOC_PWR_MAX, self.signature) 194 soc_power_min = process_param(self.d, PARAM_GET_SOC_PWR_MIN, self.signature) 198 fmax_max = process_param(self.d, PARAM_GET_FMAX_MAX, self.signature) [all …]
|
H A D | dbc.py | 33 def get_nonce(device, signature): argument 37 ret = lib.get_nonce(device.fileno(), ctypes.byref(buf), signature) 43 def set_uid(device, new_uid, signature): argument 44 if not signature: 48 ret = lib.set_uid(device.fileno(), new_uid, signature) 54 def process_param(device, message, signature, data=None): argument 55 if not signature: 60 sig = ctypes.create_string_buffer(signature, len(signature))
|
H A D | dbc_cli.py | 71 if args.signature: 72 if not os.path.exists(args.signature): 73 raise ValueError("Invalid signature file %s" % args.signature) 74 with open(args.signature, "rb") as f: 113 param, signature = process_param(d, messages[args.message], sig) 117 sig=_pretty_buffer(bytes(signature)), 126 param, signature = process_param(d, messages[args.message], sig, data) 130 sig=_pretty_buffer(bytes(signature)),
|
/openbmc/sdbusplus/include/sdbusplus/ |
H A D | vtable.hpp | 27 constexpr vtable_t method(const char* member, const char* signature, 40 constexpr vtable_t method_o(const char* member, const char* signature, 51 constexpr vtable_t signal(const char* member, const char* signature, 61 constexpr vtable_t property(const char* member, const char* signature, 74 const char* member, const char* signature, sd_bus_property_get_t get, 85 constexpr vtable_t property_o(const char* member, const char* signature, 98 constexpr vtable_t property_o(const char* member, const char* signature, 134 constexpr vtable_t method(const char* member, const char* signature, in method() argument 138 return vtable_t SD_BUS_METHOD(member, signature, result, handler, flags); in method() 141 constexpr vtable_t method_o(const char* member, const char* signature, in method_o() argument [all …]
|
/openbmc/linux/tools/power/acpi/os_specific/service_layers/ |
H A D | oslinuxtbl.c | 22 char signature[ACPI_NAMESEG_SIZE]; member 31 osl_table_name_from_file(char *filename, char *signature, u32 *instance); 33 static acpi_status osl_add_table_to_list(char *signature, u32 instance); 42 char *signature, struct acpi_table_header **table); 57 char *signature, 65 osl_get_bios_table(char *signature, 219 acpi_os_get_table_by_name(char *signature, in acpi_os_get_table_by_name() argument 240 osl_get_bios_table(signature, instance, table, address); in acpi_os_get_table_by_name() 244 status = osl_get_customized_table(STATIC_TABLE_DIR, signature, in acpi_os_get_table_by_name() 255 signature, instance, table, in acpi_os_get_table_by_name() [all …]
|
/openbmc/qemu/block/ |
H A D | vhdx-endian.c | 37 h->signature = le32_to_cpu(h->signature); in vhdx_header_le_import() 56 new_h->signature = cpu_to_le32(orig_h->signature); in vhdx_header_le_export() 82 d->signature = le32_to_cpu(d->signature); in vhdx_log_desc_le_import() 91 d->signature = cpu_to_le32(d->signature); in vhdx_log_desc_le_export() 120 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_log_entry_hdr_le_import() 135 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_log_entry_hdr_le_export() 152 hdr->signature = le32_to_cpu(hdr->signature); in vhdx_region_header_le_import() 161 hdr->signature = cpu_to_le32(hdr->signature); in vhdx_region_header_le_export() 192 hdr->signature = le64_to_cpu(hdr->signature); in vhdx_metadata_header_le_import() 200 hdr->signature = cpu_to_le64(hdr->signature); in vhdx_metadata_header_le_export()
|
/openbmc/sdbusplus/test/message/ |
H A D | native_types.cpp | 27 std::string s2 = sdbusplus::message::signature("iii"); in TEST() 28 sdbusplus::message::signature sig = s2; in TEST() 36 std::vector<sdbusplus::message::signature> v = { in TEST() 37 sdbusplus::message::signature("iii")}; in TEST() 44 std::map<sdbusplus::message::signature, int> m = { in TEST() 45 {sdbusplus::message::signature("iii"), 1}}; in TEST() 47 ASSERT_EQ(m[sdbusplus::message::signature("iii")], 1); in TEST() 52 std::unordered_map<sdbusplus::message::signature, int> u = { in TEST() 53 {sdbusplus::message::signature("iii"), 2}}; in TEST() 55 ASSERT_EQ(u[sdbusplus::message::signature("iii")], 2); in TEST()
|
/openbmc/linux/drivers/acpi/acpica/ |
H A D | tbfind.c | 34 acpi_tb_find_table(char *signature, in acpi_tb_find_table() argument 45 if (!acpi_ut_valid_nameseg(signature)) { in acpi_tb_find_table() 59 ACPI_COPY_NAMESEG(header.signature, signature); in acpi_tb_find_table() 67 if (memcmp(&(acpi_gbl_root_table_list.tables[i].signature), in acpi_tb_find_table() 68 header.signature, ACPI_NAMESEG_SIZE)) { in acpi_tb_find_table() 96 (acpi_gbl_root_table_list.tables[i].pointer->signature, in acpi_tb_find_table() 97 header.signature, ACPI_NAMESEG_SIZE) && (!oem_id[0] in acpi_tb_find_table() 113 header.signature)); in acpi_tb_find_table()
|
H A D | tbxface.c | 165 table_desc->signature.ascii)); in ACPI_EXPORT_SYMBOL_INIT() 216 acpi_get_table_header(char *signature, in ACPI_EXPORT_SYMBOL_INIT() 225 if (!signature || !out_table_header) { in ACPI_EXPORT_SYMBOL_INIT() 234 (&(acpi_gbl_root_table_list.tables[i].signature), in ACPI_EXPORT_SYMBOL_INIT() 235 signature)) { in ACPI_EXPORT_SYMBOL_INIT() 297 acpi_get_table(char *signature, in ACPI_EXPORT_SYMBOL() 307 if (!signature || !out_table) { in ACPI_EXPORT_SYMBOL() 326 if (!ACPI_COMPARE_NAMESEG(&table_desc->signature, signature)) { in ACPI_EXPORT_SYMBOL()
|
H A D | tbprint.c | 73 acpi_tb_fix_string(out_header->signature, ACPI_NAMESEG_SIZE); in acpi_tb_cleanup_table_header() 98 if (ACPI_COMPARE_NAMESEG(header->signature, ACPI_SIG_FACS)) { in acpi_tb_print_table_header() 103 header->signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header() 106 header)->signature)) { in acpi_tb_print_table_header() 131 local_header.signature, ACPI_FORMAT_UINT64(address), in acpi_tb_print_table_header()
|
H A D | tbxfload.c | 121 !ACPI_COMPARE_NAMESEG(table->signature.ascii, ACPI_SIG_DSDT) || in ACPI_EXPORT_SYMBOL_INIT() 174 (table->signature.ascii, ACPI_SIG_SSDT) in ACPI_EXPORT_SYMBOL_INIT() 175 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 177 && !ACPI_COMPARE_NAMESEG(table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 191 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 198 table->signature.ascii, in ACPI_EXPORT_SYMBOL_INIT() 406 (acpi_gbl_root_table_list.tables[i].signature.ascii, in ACPI_EXPORT_SYMBOL()
|
/openbmc/linux/tools/power/acpi/tools/acpidump/ |
H A D | apdump.c | 33 if (!ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_header() 37 if (!acpi_ut_valid_nameseg(table->signature)) { in ap_is_valid_header() 40 *(u32 *)table->signature); in ap_is_valid_header() 73 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_is_valid_checksum() 88 table->signature); in ap_is_valid_checksum() 116 if (ACPI_VALIDATE_RSDP_SIG(table->signature)) { in ap_get_table_length() 168 table->signature, ACPI_FORMAT_UINT64(address)); in ap_dump_table_buffer() 292 int ap_dump_table_by_name(char *signature) in ap_dump_table_by_name() argument 301 if (strlen(signature) != ACPI_NAMESEG_SIZE) { in ap_dump_table_by_name() 304 signature); in ap_dump_table_by_name() [all …]
|
/openbmc/linux/Documentation/security/ |
H A D | digsig.rst | 19 Digital signature verification API provides a method to verify digital signature. 22 Digital signature verification is implemented using cut-down kernel port of 27 Public key and signature consist of header and MPIs:: 38 uint8_t version; /* signature format version */ 39 time_t timestamp; /* signature made */ 48 Signature header is used as an input to generate a signature. 49 Such approach insures that key or signature header could not be changed. 58 digsig_verify() - digital signature verification with public key 62 * digsig_verify() - digital signature verification with public key 64 * @sig: digital signature [all …]
|
/openbmc/linux/Documentation/arch/arm64/ |
H A D | acpi_object_usage.rst | 10 the table signature (the first four bytes of the table) is the only portion 30 AEST Signature Reserved (signature == "AEST") 37 AGDI Signature Reserved (signature == "AGDI") 44 APMT Signature Reserved (signature == "APMT") 51 BERT Section 18.3 (signature == "BERT") 58 BOOT Signature Reserved (signature == "BOOT") 64 BGRT Section 5.2.22 (signature == "BGRT") 71 CEDT Signature Reserved (signature == "CEDT") 78 CPEP Section 5.2.18 (signature == "CPEP") 86 CSRT Signature Reserved (signature == "CSRT") [all …]
|
/openbmc/linux/drivers/net/wwan/iosm/ |
H A D | iosm_ipc_mux_codec.h | 101 __le32 signature; member 120 __le32 signature; member 137 __le32 signature; member 158 __le32 signature; member 183 __le32 signature; member 207 __le32 signature; member 235 __le32 signature; member
|
/openbmc/linux/drivers/gpu/drm/nouveau/nvkm/nvfw/ |
H A D | flcn.c | 71 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_dump() 72 hdr->signature[3]); in flcn_bl_dmem_desc_dump() 95 hdr->signature[0], hdr->signature[1], hdr->signature[2], in flcn_bl_dmem_desc_v1_dump() 96 hdr->signature[3]); in flcn_bl_dmem_desc_v1_dump()
|
/openbmc/openpower-pnor-code-mgmt/test/ |
H A D | test_signature.cpp | 85 signature = std::make_unique<Signature>(extractPath, "pnor.xz.squashfs", in SetUp() 92 std::unique_ptr<Signature> signature; member in SignatureTest 101 EXPECT_TRUE(signature->verify()); in TEST_F() 110 EXPECT_FALSE(signature->verify()); in TEST_F() 119 EXPECT_FALSE(signature->verify()); in TEST_F() 128 EXPECT_FALSE(signature->verify()); in TEST_F() 136 EXPECT_FALSE(signature->verify()); in TEST_F()
|
/openbmc/linux/kernel/module/ |
H A D | decompress.c | 65 const u8 signature[] = { 0x1f, 0x8b, 0x08 }; in module_gzip_header_len() local 68 if (size < len || memcmp(buf, signature, sizeof(signature))) in module_gzip_header_len() 152 static const u8 signature[] = { 0xfd, '7', 'z', 'X', 'Z', 0 }; in module_xz_decompress() local 159 if (size < sizeof(signature) || in module_xz_decompress() 160 memcmp(buf, signature, sizeof(signature))) { in module_xz_decompress() 210 static const u8 signature[] = { 0x28, 0xb5, 0x2f, 0xfd }; in module_zstd_decompress() local 221 if (size < sizeof(signature) || in module_zstd_decompress() 222 memcmp(buf, signature, sizeof(signature))) { in module_zstd_decompress()
|
/openbmc/linux/crypto/asymmetric_keys/ |
H A D | Kconfig | 8 as encryption, decryption, signature generation and signature 22 If signature generation and/or verification are to be used, 54 signature data and provides the ability to verify the signature. 69 bool "Support for PE file signature verification" 76 This option provides support for verifying the signature(s) on a 80 tristate "Run FIPS selftests on the X.509+PKCS7 signature verification" 82 This option causes some selftests to be run on the signature
|
/openbmc/qemu/tests/unit/ |
H A D | test-crypto-akcipher.c | 688 const uint8_t *signature; member 825 .signature = exp_signature_rsa1024_pkcs1, 870 .signature = exp_signature_rsa2048_pkcs1, 881 g_autofree uint8_t *signature = NULL; in test_akcipher() local 918 if (data->signature != NULL) { in test_akcipher() 919 signature = g_new(uint8_t, data->slen); in test_akcipher() 921 signature, data->slen, in test_akcipher() 927 g_assert(qcrypto_akcipher_verify(pub_key, data->signature, data->slen, in test_akcipher() 930 g_assert(qcrypto_akcipher_verify(pub_key, signature, data->slen, in test_akcipher() 933 ++signature[0]; in test_akcipher() [all …]
|
/openbmc/sdbusplus/test/vtable/ |
H A D | vtable.cpp | 60 strcmp(t1.x.method.signature, t2.x.method.signature) == 0 && in operator ==() 67 strcmp(t1.x.signal.signature, t2.x.signal.signature) == 0 && in operator ==() 72 strcmp(t1.x.property.signature, t2.x.property.signature) == in operator ==()
|
/openbmc/linux/arch/x86/include/asm/ |
H A D | cpuid.h | 158 uint32_t base, eax, signature[3]; in hypervisor_cpuid_base() local 161 cpuid(base, &eax, &signature[0], &signature[1], &signature[2]); in hypervisor_cpuid_base() 163 if (!memcmp(sig, signature, 12) && in hypervisor_cpuid_base()
|
/openbmc/linux/kernel/ |
H A D | Kconfig.kexec | 49 bool "Verify kernel signature during kexec_file_load() syscall" 54 signature of the kernel image. The image can still be loaded without 55 a valid signature unless you also enable KEXEC_SIG_FORCE, though if 56 there's a signature that we can check, then it must be valid. 58 In addition to this option, you need to enable signature 63 bool "Require a valid signature in kexec_file_load() syscall" 67 This option makes kernel signature verification mandatory for 71 bool "Enable Image signature verification support (ARM)" 77 Enable Image signature verification support. 80 bool "Enable bzImage signature verification support" [all …]
|
/openbmc/qemu/tests/qtest/ |
H A D | prom-env-test.c | 31 uint32_t signature; in check_guest_memory() local 36 signature = qtest_readl(qts, ADDRESS); in check_guest_memory() 37 if (signature == MAGIC) { in check_guest_memory() 43 g_assert_cmphex(signature, ==, MAGIC); in check_guest_memory()
|